fbpx

Cybersecurity & IT Threats

Expanding ‘IT Threats’ to include various aspects of cybersecurity, not just threats.

UnitedHealth Group admits to paying ransom after Change Healthcare cyber attack

UnitedHealth Group admits to paying ransom after Change Healthcare cyber attack

UnitedHealth Group admits to paying ransom after Change Healthcare cyber attack UnitedHealth Group, the parent company of Change Healthcare, has confirmed it paid the ransom to protect millions of potentially exposed customers UnitedHealth Group has admitted it paid a ransom to threat actors who exfiltrated patient data in a breach affecting its subsidiary Change Healthcare. […]

UnitedHealth Group admits to paying ransom after Change Healthcare cyber attack Read More »

10 colleges and universities shaping the future of cybersecurity education - Help Net Security

10 colleges and universities shaping the future of cybersecurity education – Help Net Security

10 colleges and universities shaping the future of cybersecurity education Institutions featured on this list often provide undergraduate and graduate degrees, courses, as well as certificate programs tailored to meet the growing demand for cybersecurity professionals in various industries. Some notable colleges and universities renowned for their cybersecurity programs and courses include: Carnegie Mellon University

10 colleges and universities shaping the future of cybersecurity education – Help Net Security Read More »

Change Healthcare Finally Admits It Paid Ransomware Hackers—and Still Faces a Patient Data Leak

Change Healthcare Finally Admits It Paid Ransomware Hackers—and Still Faces a Patient Data Leak

More than two months after the start of a ransomware debacle whose impact ranks among the worst in the history of cybersecurity, the medical firm Change Healthcare finally confirmed what cybercriminals, security researchers, and Bitcoin’s blockchain had already made all too clear: that it did indeed pay a ransom to the hackers who targeted the

Change Healthcare Finally Admits It Paid Ransomware Hackers—and Still Faces a Patient Data Leak Read More »

Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware! - Help Net Security

Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware! – Help Net Security

Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware! More organizations hit by ransomware gangs are starting to realize that it doesn’t pay to pay up: “In Q1 2024, the proportion of victims that chose to pay touched a new record low of 28%,” ransomware incident response firm Coveware has found. Victim

Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware! – Help Net Security Read More »

OfflRouter Malware Evades Detection in Ukraine for Almost a Decade

OfflRouter Malware Evades Detection in Ukraine for Almost a Decade

Select Ukrainian government networks have remained infected with a malware called OfflRouter since 2015. Cisco Talos said its findings are based on an analysis of over 100 confidential documents that were infected with the VBA macro virus and uploaded to the VirusTotal malware scanning platform. “The documents contained VBA code to drop and run an

OfflRouter Malware Evades Detection in Ukraine for Almost a Decade Read More »

Recover from Ransomware in 5 Minutes—We will Teach You How!

Recover from Ransomware in 5 Minutes—We will Teach You How!

Super Low RPO with Continuous Data Protection: Super Low RPO with Continuous Data Protection: Dial Back to Just Seconds Before an Attack Zerto, a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point

Recover from Ransomware in 5 Minutes—We will Teach You How! Read More »

How to Conduct Advanced Static Analysis in a Malware Sandbox

How to Conduct Advanced Static Analysis in a Malware Sandbox

Sandboxes are synonymous with dynamic malware analysis. They help to execute malicious files in a safe virtual environment and observe their behavior. However, they also offer plenty of value in terms of static analysis. See these five scenarios where a sandbox can prove to be a useful tool in your investigations. Detecting Threats in PDFs

How to Conduct Advanced Static Analysis in a Malware Sandbox Read More »

Microsoft Edge Bug Could Have Allowed Attackers to Silently Install Malicious Extensions

Microsoft Edge Bug Could Have Allowed Attackers to Silently Install Malicious Extensions

A now-patched security flaw in the Microsoft Edge web browser could have been abused to install arbitrary extensions on users’ systems and carry out malicious actions. “This flaw could have allowed an attacker to exploit a private API, initially intended for marketing purposes, to covertly install additional browser extensions with broad permissions without the user’s

Microsoft Edge Bug Could Have Allowed Attackers to Silently Install Malicious Extensions Read More »

US and UK accuse China of cyber operations targeting domestic politics

US and UK accuse China of cyber operations targeting domestic politics

US and UK accuse China of cyber operations targeting domestic politics The U.S. government on Monday accused seven Chinese nationals and a company based in Wuhan of orchestrating a wide-ranging hacking operation targeting political targets in the United States, in what is Washington’s latest attempt to curb what officials describe as increasingly aggressive cyber operations

US and UK accuse China of cyber operations targeting domestic politics Read More »

20 essential open-source cybersecurity tools that save you time - Help Net Security

20 essential open-source cybersecurity tools that save you time – Help Net Security

20 essential open-source cybersecurity tools that save you time Open-source software’s adaptive nature ensures its durability, relevance, and compatibility with new technologies. When I started digging deeper into the open-source cybersecurity ecosystem, I discovered an engaged community of developers working to find practical solutions to many problems, one of them being saving time. Here are

20 essential open-source cybersecurity tools that save you time – Help Net Security Read More »

Scroll to Top